Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Anomaly Detection Course Catalog
University of Colorado Boulder
Skills you'll gain: Computer Vision, Image Analysis, Tensorflow, Deep Learning, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Applied Machine Learning, Machine Learning, Performance Tuning, Algorithms
- Status: Free Trial
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Wireless Networks
- Status: Free Trial
Infosec
Skills you'll gain: Cyber Threat Hunting, Threat Detection, System Monitoring, Cybersecurity, Cyber Operations, Continuous Monitoring, Network Security, Endpoint Security, Network Monitoring, Scripting
- Status: Free Trial
Skills you'll gain: Computer Vision, Image Analysis, Matlab, Artificial Neural Networks, Deep Learning, Applied Machine Learning, Artificial Intelligence and Machine Learning (AI/ML), Predictive Modeling, Machine Learning Methods, Performance Tuning, Classification And Regression Tree (CART), Data Processing
- Status: Free Trial
Skills you'll gain: Incident Response, Cyber Threat Hunting, Computer Security Incident Management, Cyber Threat Intelligence, Threat Detection, Threat Management, Security Management, Cybersecurity, Continuous Monitoring, Security Information and Event Management (SIEM), Scenario Testing, Technical Communication
Google Cloud
Skills you'll gain: Cyber Operations, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, DevOps, Threat Detection, Cyber Security Assessment, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation
- Status: Free Trial
Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Malware Protection, Vulnerability Assessments
- Status: Free Trial
Infosec
Skills you'll gain: Network Analysis, Network Security, Cybersecurity, Threat Detection, Network Monitoring, Anomaly Detection, Network Protocols, TCP/IP
- Status: Free Trial
Skills you'll gain: Real-Time Operating Systems, Embedded Systems, Internet Of Things, System Requirements, Software Engineering, System Testing, Software Development, Verification And Validation, Integration Testing, Performance Testing, Secure Coding, Cloud-Based Integration, Systems Integration, IT Security Architecture, System Implementation, Requirements Analysis, Innovation, Encryption, Algorithms
- Status: Free
Coursera Project Network
Skills you'll gain: Keras (Neural Network Library), Tensorflow, Applied Machine Learning, Deep Learning, Artificial Neural Networks
- Status: Free Trial
Universidad de los Andes
Skills you'll gain: Penetration Testing, Threat Detection, Vulnerability Assessments, Threat Modeling, Cybersecurity, Vulnerability Management, Cyber Security Assessment, Risk Management Framework, Cyber Attacks, Security Testing, Information Technology, Cyber Risk, Web Servers, Servers, Web Applications
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Computer Security Incident Management, Cybersecurity, Incident Response, Applied Machine Learning, Network Security, Machine Learning Algorithms, Machine Learning, Unsupervised Learning, Supervised Learning, Deep Learning, Artificial Neural Networks
In summary, here are 10 of our most popular anomaly detection courses
- Deep Learning Applications for Computer Vision:Â University of Colorado Boulder
- Introduction to IT Security:Â Akamai Technologies, Inc.
- Python for Active Defense:Â Infosec
- Introduction to Deep Learning for Computer Vision:Â MathWorks
- Advanced Threat Hunting and Incident Response:Â LearnQuest
- Modern Security Operations:Â Google Cloud
- Technical Deep Dive with Incident Response Tools:Â Infosec
- Defensive Python:Â Infosec
- Capstone: Autonomous Runway Detection for IoT:Â EIT Digital
- Creating Multi Task Models With Keras:Â Coursera Project Network